Language:EN
Pages: 7
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
configure and test network security

Configure and test network security

ASSESSMENT 2

Requirements

Using knowledge acquired from the unit, read over the following case study and answer the questions to the best of your ability. Identify the useful information and criteria that support your answers.You may assume anything that has not been mentioned as long as you clearly state it is an assumption.

All of their data will be stored on servers in an offsite server farm which will be physically guarded around the clock by a professional team of security guards. Their programming team, the people behind their application as well as making the service possible all work remotely. Their current setup makes it so that the programmers are only able to access the specific code they are needed for so it is not possible for them to steal any data which will be useful to them. They are also made to work on the company’s own platform so none of the data is stored on the endpoint devices either.

Users will access their own storage space using the company’s own application which currently uses two factor authentications.

- Segment the network - Implement a VPN - Ensure adequate maintenance

2.3 Once you’ve identified the various risks and vulnerabilities as well as what can be done to counter them. The next step is to implement your solution.

2.4 Suppose after discussing it with the various parties such as Jared, the systems administrator, network administrator, as well as others from the business side of things, it’s been decided that StoreIt will host its own VPN server.

Aside from this you discover that StoreIt has 3 redundant, meaning 4 total, internet connections to ensure availability as well as to improve overall speed.

2.5 After you have implemented the security measures from the previous questions, Jared asks how you plan on testing the various systems to ensure everything is working as it should.

2.6 Given the various systems that are established throughout StoreIt’s network, how will you manage to keep track of everything? How will you identify any incidents or attacks and what will you have to do in order to keep the network secure?

Keep An Eye On The Firewall's Efficiency. A firewall is a piece of software or hardware or a combination of both that is used to prevent unwanted access to computers and networks. Passwords Should Be Modified At Least A Quarter.

Suppose that StoreIt begins its business as planned thanks to the efforts of both you and Jessica.

While looking through the latest news in network security you find that a new vulnerability has been discovered in the software that is used for multiple StoreIt servers. Similarly, you find that in order to fix this issue a new patch had been revealed and it is highly recommended that it be installed as soon as possible.

insider risks more effectively. Identifying and resolving security bugs or weaknesses discovered during the post-incident practices is a foregone conclusion.

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Charles Howe

PageId: DOC4A47E6E